This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.
☆16Oct 15, 2016Updated 9 years ago
Alternatives and similar repositories for LinuxMalwareSourceCode
Users that are interested in LinuxMalwareSourceCode are comparing it to the libraries listed below
Sorting:
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- Уг хэсэгт миний унших дуртай таньд хэрэг болох номнуудыг оруулах болно 🧠☆13Apr 19, 2025Updated 10 months ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Scripts for car hack on nitro type☆29Feb 28, 2024Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 2 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- Keygen for the ATM Malware Cutlet Maker☆89Dec 28, 2020Updated 5 years ago
- Example of CRUSH compression with optimal parsing using BriefLZ algorithms☆16Nov 1, 2023Updated 2 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆10Dec 10, 2013Updated 12 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Lightweight cryptography☆14Nov 7, 2022Updated 3 years ago
- # LIRI Bot ### Overview In this assignment, you will make LIRI. LIRI is like iPhone's SIRI. However, while SIRI is a Speech Interpretat…☆11Feb 15, 2019Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Telegram BotNet☆35Dec 9, 2023Updated 2 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 3 years ago
- Motorola 68k implementation of decompression code for LZ4 (https://github.com/lz4/lz4) and LZSA (https://github.com/emmanuel-marty/lzsa)☆11Feb 21, 2021Updated 5 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year
- Some terrible features you can add to Python☆12Jan 27, 2019Updated 7 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆12Sep 10, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Jackpot is the easiest way to get paid using ruby.☆78Aug 24, 2013Updated 12 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- ☆13Aug 18, 2023Updated 2 years ago
- LZE enhancement for Z80☆14Jun 25, 2020Updated 5 years ago
- ☆13Apr 16, 2025Updated 10 months ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated 3 weeks ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago